Deck 12: Threat Assessment
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/15
Play
Full screen (f)
Deck 12: Threat Assessment
1
Threat assessment is:
A) a procedure wherein the amount of risk posed by actual or perceived threats is evaluated
B) a process during which indicators of violence, appropriate tactical responses, and psychological interventions are identified
C) based upon the idea that targeted violence is preventable
D) all of the above
A) a procedure wherein the amount of risk posed by actual or perceived threats is evaluated
B) a process during which indicators of violence, appropriate tactical responses, and psychological interventions are identified
C) based upon the idea that targeted violence is preventable
D) all of the above
D
2
Threat assessment differs from violence-risk assessment in that:
A) assessing violence risk places an individual's likelihood to engage in violence on a continuum, while threat assessment determines whether a threat is credible and focuses on intervening
B) assessing violence risk labels an offender as either violent or not violent, while threat assessment determines whether a threat is credible
C) assessing violence risk focuses on psychological intervention, while threat assessment deals only with whether a threat is likely to be carried out
D) both violence risk assessment and threat assessment predict dangerousness, but neither addresses intervention
A) assessing violence risk places an individual's likelihood to engage in violence on a continuum, while threat assessment determines whether a threat is credible and focuses on intervening
B) assessing violence risk labels an offender as either violent or not violent, while threat assessment determines whether a threat is credible
C) assessing violence risk focuses on psychological intervention, while threat assessment deals only with whether a threat is likely to be carried out
D) both violence risk assessment and threat assessment predict dangerousness, but neither addresses intervention
A
3
The range of concerning behaviors includes:
A) sudden changes in occupational functioning, dropping out of school, mood swings
B) experiencing deep depression and isolation following personal loss
C) making threatening communications, stalking, expressing grievances and/or delusional beliefs
D) all of the above
A) sudden changes in occupational functioning, dropping out of school, mood swings
B) experiencing deep depression and isolation following personal loss
C) making threatening communications, stalking, expressing grievances and/or delusional beliefs
D) all of the above
D
4
The majority of stalking offenses involves _____ stalking _____ who are __________.
A) men; men; not acquainted with them.
B) women; women; not acquainted with them.
C) men; women; current or former romantic partners
D) women; men; current or former romantic partners
A) men; men; not acquainted with them.
B) women; women; not acquainted with them.
C) men; women; current or former romantic partners
D) women; men; current or former romantic partners
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
5
When faced with a hostage taker who is delusion, police should:
A) lecture him or her about his or her unrealistic, wrong, or ridiculous ideas
B) build rapport and make the hostage taker feel heard
C) immediately challenge his or her delusions
D) wait for a psychiatrist to arrive on the scene and forcibly medicate the individual
A) lecture him or her about his or her unrealistic, wrong, or ridiculous ideas
B) build rapport and make the hostage taker feel heard
C) immediately challenge his or her delusions
D) wait for a psychiatrist to arrive on the scene and forcibly medicate the individual
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
6
Cyber bullying involves:
A) sending mean or abusive text messages
B) posting rumors and embarrassing photos on social media
C) setting up fake profiles on social media
D) all of the above
A) sending mean or abusive text messages
B) posting rumors and embarrassing photos on social media
C) setting up fake profiles on social media
D) all of the above
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
7
List and describe the three steps which comprise the threat assessment process.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
8
Identify four categories of threat and provide examples of each.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
9
When assessing stalking threats, what three areas of concern must investigators consider?
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
10
Identify four types of hostage takers and briefly describe their associated characteristics and motivations.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
11
Discuss the impact of psychiatric symptoms on a suspect's potential to carry out a planned threat.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
12
Discuss the relationship between bullying and deadly school violence. Provide examples from Columbine, VA Tech, etc.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
13
Outline the FBI's four-prong approach to assessing threats of school violence.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
14
Define terrorism and outline its goals.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
15
Explain the concept of a collectivist mentality as it relates to terrorist groups.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck